Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps

被引:2
|
作者
Jia, Huiwen [1 ]
Hu, Yupu [1 ]
Wang, Xu An [2 ]
Liu, Zheliang [1 ]
Xiong, Wei [1 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
[2] Engieering Univ CAPF, Xian, Peoples R China
关键词
multipartite non-interactive key exchange; multilinear maps; MCDH assumption; INTEGERS;
D O I
10.1109/3PGCIC.2015.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key agreement is a fundamental primitive in cryptography and the question of generalizing the celebrated 2 party non-interactive key exchange, Diffie-Hellman protocol, to a multipartite setting was left as an important open problem. Boneh and Silverberg proposed the notion of multilinear maps for the first time in 2003 and put forward a theoretical construction of multipartite non-interactive key exchange protocol from multilinear maps. In their protocol, however, the number of users N and the multilinearity k are related by N=k+1, resulting in the system initializing another multilinear map when the number of users who want to exchange a session key changes. In this paper, we describe two extensional schemes, which enables any less than or equal to N users derive a common shared key from an (N-1)-multilinear map. In addition, using our extensional schemes, we show a concrete scenario: The establishment of any discussion group in a user group. Furthermore, we analyze its security.
引用
收藏
页码:771 / 774
页数:4
相关论文
共 50 条
  • [41] Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
    Chen, Yu
    Huang, Qiong
    Zhang, Zongyang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 15 - 33
  • [42] On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 74 : 883 - 889
  • [43] A framework for non-interactive instance-dependent commitment schemes (NIC)
    Kapron, Bruce
    Malka, Lior
    Srinivasan, Venkatesh
    THEORETICAL COMPUTER SCIENCE, 2015, 593 : 1 - 15
  • [44] Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments
    Martin-Fernandez, Francisco
    Caballero-Gil, Pino
    Caballero-Gil, Candido
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 261 - 271
  • [45] Broadcast encryption based non-interactive key distribution in MANETs
    Yang, Yang
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 533 - 545
  • [46] On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 883 - 889
  • [47] Provably secure non-interactive key distribution based on pairings
    Dupont, R
    Enge, A
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 270 - 276
  • [48] Non-interactive key establishment in mobile ad hoc networks
    Li, Zhenjiang
    Garcia-Luna-Aceves, J. J.
    AD HOC NETWORKS, 2007, 5 (07) : 1194 - 1203
  • [49] A framework for non-interactive instance-dependent commitment schemes (NIC)
    Kapron, Bruce
    Malka, Lior
    Srinivasan, Venkatesh
    Theoretical Computer Science, 2015, 593 : 1 - 15
  • [50] A framework for non-interactive instance-dependent commitment schemes (NIC)
    Kapron, Bruce
    Malka, Lior
    Srinivasan, Venkatesh
    Theoretical Computer Science, 2015, 593 : 1 - 15